Overview of the real-world attack

Assignment Help Other Subject
Reference no: EM133021386

MIS607 Cybersecurity - Laureate International Universities

Threat Model Report

Learning Outcome 1 Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2 Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 4 Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

The goal of assessment 2 (A2) is to identify threats/vulnerabilities in the case scenario described in the associated file, Assessment Initial Case Scenario.docx. Not all threats/vulnerabilities you "discover" are in the initial case scenario. The scenario discusses some elements of the business that are needing mitigation, but you will need to also "discover" other threats/vulnerabilities.

The word count for this assessment is 1,500 words (±10%), not counting tables or figures. Tables and figures must be captioned (labelled) and referred to by caption (note that publishers do not guarantee tables and figures to be placed the same order or location as in your article). Caution: Items without a caption may be treated as if they are not in the report.

Be careful not to use up word count discussing cybersecurity basics. This is not an exercise in summarising your class notes, and such material will not count towards marks.
The report will not be marked without an Academic Integrity Declaration (see below).

DFD Requirements
The DFD must relate to the business described in the initial case scenario. Remember, the DFD is the first step in the risk analysis, but it is not the main output of the assessment. The main output is the categorised threats, see below.

For the DFD, you need at least a context diagram and a level-0 diagram. You can include further levels if you feel they are needed to show a threat boundary, but this is not necessary. The level-0 diagram (and further level diagrams, if needed) must not break the rules for proper DFD formation. And the DFDs (excluding the context diagram) must have labelled threat boundaries.

Threat Discovery
The main output of A2 should be a set of no less than 10 threats or vulnerabilities that need mitigation in the organisation. You will discover these with the help of the DFD and the threat boundaries.

The main threat for this assessment resembles a real-world attack. You need to develop a brief, factual overview of the real-world attack (web links can count as references here since the attack might not yet be covered academically). You are required to reference suggested mitigations, or costs in the real-world attack, this will help enormously with both A2 and A3 and will be taken into consideration when marking. Note carefully that any explanation of the real-world case is based on real information/data, not speculation or simulated "discovery".

It is important to understand that you need to "discover" additional threats/vulnerabilities on the associated initial case scenario. The scenario is only an initial assessment of the organisation. Your "discovery" can be simulated, based on your simulated investigation.

Obviously, you must cover the main threats already identified in the scenario, but other threats/vulnerabilities should be "discovered" by you.

Inform the reader about what discovery techniques were used. In dot points inform the audience.....who you talked to, questions you asked - but keep this very brief...8-10 dot points max.

Imagine yourself as a consultant called in to work inside the business to discover threats.

For this assignment, business acumen and business logic in approaching threats is what is required of you.

STRIDE methodology will be used for the reports. Note carefully that the DFD itself is not the main output of the assignment. The main result of the report is a set of threats or vulnerabilities. Important points are:

• Try to map these threats/vulnerabilities as best you can against threat boundaries;
• and categorize them as best you can against STRIDE categories. The STRIDE categories are not the threats.
Do not be concerned if the threats you discover do not fit all STRIDE categories. In a full, real-world assessment with hundreds of threats, this would be the case, but with around 10 threats this will probably not be possible. Try to cover at least three.

You can make assumptions, but the report is written from the point of view of a consultant who has made "discoveries" from their investigations. In the simulation you may gather needed information from stakeholders. Assessment markers are aware that the technical information "discovered" by you might not be 100% accurate in all details. However, your discoveries should be somewhat realistic.

Report Structure & Format
The report should have the following heading structure.
• Title Page
With subject code and name, assignment title, student's name, student number, and lecturer's
name. Also include AI declaration.
• Executive Summary
This should be written after the report and should briefly summarise what you did and what you found. It should be capable of being read by management generally, even those with relatively little IS experience.
• Body of the Report
DFD
threat discovery
threat list and STRIDE categorisation
• Conclusion
Summarise major findings or recommendations that the report puts forward.
• References
Use only APA style for citing and referencing

Attachment:- Case Scenario.rar

Reference no: EM133021386

Questions Cloud

Explain the importance of self- awareness : Integrate strategies to effectively interact with others in a diverse professional context and Identify and reflect on own strengths and their application
What is the significance of legal systems : What is the significance of legal systems in the context of shifting toward a market-based economic system?
Write a professional practice reflection : Write a professional practice reflection - Complete the skills audit to identify your level of skills and knowledge with compared to the nationally recognised
Identify your level of skills and knowledge : Identify your two strongest skills and reflect on why those are your strongest. Link this to your experiences in the MBIS and your life in general
Overview of the real-world attack : The main threat for this assessment resembles a real-world attack. You need to develop a brief, factual overview of the real-world attack
Describe comprehensive recruitment strategy : Based on your findings in the previous case study that your applicant pool did not include some groups of people, you decide to assess Fox Garrity's recruitment
What is internal exchange rate risk management techniques : What is Internal Exchange Rate Risk Management Techniques and how can I apply it to global business?
Similarities between singapore and australis : What are the similarities between Singapore and Australis?
How does job satisfaction tend to differ : How does job satisfaction tend to differ between early and middle adulthood?

Reviews

len3021386

10/30/2021 3:38:18 AM

I need all steps to be done Please do it carefully follow each and every instruction and Follow Marking Criteria and references Very STRICTLY

Write a Review

Other Subject Questions & Answers

  Critically analyze current scientific literature

Critically analyze current scientific literature and translate into lay language. Evaluate a variety of websites for quality/sound sports nutrition information.

  Appears to be a tendency for measured betas of individual

There appears to be a tendency for measured betas of individual securities to revert toward the beta of the market portfolio or the beta of the industry of which the company is a part.

  Writing the narrative of a grant or contract is no different

Prepare a draft outline that highlights what your proposal narrative might look like for your chosen public health FOA. As this is an outline, use bullet points to identify the areas your proposal narrative will address. Be sure to include a title ..

  What are the benefits and pitfalls of each approach

Why do some organizations promote from within, whereas others rely on outside hiring? What are the benefits and pitfalls of each approach?

  Describe ruben darios feelings towards the roosevelt

Describe Ruben Dario's feelings towards the Roosevelt Corollary. Why would he feel that way. Relate your answer to the poem.

  How information useful in your everyday work with children

Consider what age group you hope to work with and reflect on which aspects of Piaget's theory will be the most useful to you in your future career.

  Miriam that her picture is included in calendar

Miriam walks into your office. A friend has told Miriam that her picture is included in a calendar. The photo in the calendar is of Miriam when she was at the b

  Interconnectedness of the planet

Think about your mandala project. Has focusing, researching, and visualizing your relationship with nature, changed your perspective? Has it made you more aware of the interconnectedness of the planet and all its life forms?

  Complete the self-assessment of your current comfort levels

Complete the self-assessment of your current comfort levels and total your score. If you are willing, please share your total score with your classmates.

  About policymaking as occurs in organizations and government

Write an essay about Policymaking as it occurs in organizations and governments. How policies are made, approved and enforced.

  Identify three aspects of physical development

Identify three aspects of physical development that happen during middle childhood and explain how each differs in a 6-year-old versus a 12-year-old.

  Example of a sampling error or a non sampling error

Determine whether the following is an example of a sampling error or a non sampling error.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd